ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • Cyber Risk Report 2016 Executive Summary

    Sponsored by: Hewlett Packard Enterprise

    In this year's cyber risk report, you will discover the evolving nature of cybercrime, as well as the developing legislation meant to curtail it. Read on to delve into what defenders now face as they look to secure their enterprises.

  • Behind the Mask: The Changing Face of Hacking

    Sponsored by: Hewlett Packard Enterprise

    This new report will help you learn more about hackers and how they work. Read it to understand what attack methods hackers use, why simple approaches like phishing still work, and more.

  • Few Fully Prepared for Software Security Risks

    Sponsored by: Hewlett Packard Enterprise

    This white paper shows you results from a recent security survey and the value of testing your security measure regularly.

  • Best Practices for Strong Cyber Security

    Sponsored by: Hewlett Packard Enterprise

    Discover how enterprise security best practices can help you avoid suffering financial losses, damage to your brand, and damage to customer relationships caused by undetected or detected too late cyber attacks.

  • Preventing Fraud Before Customers Become Affected

    Sponsored by: IBM

    Learn how Pulaski Bank achieved the layered security and malware prevention they were looking for and how their struggles can benefit your organization. Not only will you prevent potential fraud, but also increase customer awareness.

  • Masergy Unified Enterprise Security Demo

    Sponsored by: MASERGY

    Access this webcast to discover how machine learning combined with continuous human monitoring can harden your defenses and improve your advanced threat detection capabilities.

  • The pitfalls of two-factor authentication

    Sponsored by: IBM

    Discover the shortcomings of two-factor authentication, including its inability to defend against theft and transaction signings. Learn how a better layered security approach can help identify the root cause of malware and help protect high-value transactions.

  • Is Microsoft Office 365 Secure?

    Sponsored by: Proofpoint, Inc.

    More than four in ten organizations are in the process of implementing Office 365 or already use it. This infographic gives you important statistics and insights on the top security, encryption and archiving challenges faced while moving to Office 365, based on a survey conducted by UBM Tech.

  • FINRA Regulat ions Requi re TechnologyInnovat ion to Address Supervision andMoni tor ing Workload

    Sponsored by: Proofpoint, Inc.

    Business leaders need to find a healthy balance between flexible business solutions and data monitoring abilities. Learn how to protect and govern your sensitive information to help mitigate risk and, in the process, better comply with regulatory requirements.

  • Proofpoint Advanced Security Platform for Microsoft Office 365

    Sponsored by: Proofpoint, Inc.

    Safeguard against advanced threats and targeted attacks to your Office 365 users. Gain visibility and threat insights to identify attacks quickly and contain them as early as possible.

  • B2B Success Story: E-Commerce Strategy for Thousands of Daily Transactions

    Sponsored by: Axway

    In this video, Shawn Buske discusses the e-commerce system that Jabil chose to handle thousands of daily B2B transactions. Jabil was also able to easily meet SLA compliance and security compliance requirements.

  • The Many Benefits of Email Security Gateways

    Sponsored by: ZixCorp

    This e-guide examines the benefits of email security gateways. Beyond just preventing malicious email, gateways have a plethora of other benefits including DLP and BYOD security.

  • Security Solutions for Mobile Users in the Workplace

    Sponsored by: HID

    This e-book describes the security landscape for mobile devices and how near field communications can improve the user experience on mobile devices while allowing companies to protect their assets and manage costs efficiently.

  • Impact Assessment of a Gigamon Partnership

    Sponsored by: Gigamon

    This Forrester Report examines the ROI enterprises may realize from deploying Gigamon for network security needs. It provides readers with clear cut choices to evaluate the possible financial impact of Gigamon on their organization.

  • Reporting Cybersecurity to the Board

    Sponsored by: BitSight

    Today, boards have to consider the regulatory, fiduciary, organizational, and personal liability that could come from a data breach. Download this free guide today, and you'll have everything you need for your next board presentation to hit all the right points.

  • Revealing Security Performance Metrics Across Major World Economies

    Sponsored by: BitSight

    In its latest research report, BitSight studied the security performance of companies per country with more than 50% of their IP space in: The United States, United Kingdom, Germany, Brazil, China and Singapore.

  • Mobile Malware

    Sponsored by: MobileIron

    Four major threats are currently targeting iOS and Android devices using very clever tactics. Learn how these new malware tools are infecting mobile devices today and how you can secure your data against these and other growing threats.

  • Optimizing Web Application Security for the New Bad Bot Threat Landscape

    Sponsored by: Distil Networks

    Winning on today's bot battlefield takes time, expertise, and a dedicated team. Get a glimpse into the world of anti-bot defenses and win the battle of the bots on your site.

  • Defend Against Threats of Global Operations

    Sponsored by: Verizon

    Learn how the organization decided to replace the company's global remote-access infrastructure with platforms that allow it greater overall visibility to areas of increased vulnerability. Discover how to guard both your global network and application delivery platforms to help protect your reputation and maintain business continuity.

  • Masergy Customer turned Evangelist, Stuart Carrothers talks Masergy

    Sponsored by: MASERGY

    In this video, you'll discover a security vendor that wants to work with you for the lifetime of your organizations. From them, you'll get real-time visibility and change bandwidth as you need it. Learn about largest global network in the world based on software defined networking.

  • Understand the Business Impact and Cost of a Breach

    Sponsored by: MASERGY

    This Forrester Report will help security and risk leaders build a case for investment to show business leaders what kind of investment it'll take to adequately protect their organization.

  • Agile Security at the Speed of Modern Business

    Sponsored by: CloudPassage

    An agile security solution implements orchestration and automation to keep up with diverse, fluid and fast-moving infrastructures. Learn how agile security can empower your CISO and their teams to move at the speed of modern business and become enablers of innovation and growth.

  • Regulatory Compliance Doesn't Have to be a Drag with Data Governance

    Sponsored by: Intel Security

    Read on as experts explore the challenges that typically plague compliance efforts, and ways effective data governance enables repeatable processes for managing information in a way that's conducive to these stringent standards.

  • Operationalizing Threat Intelligence Data: The Problems of Relevance and Scale

    Sponsored by: Anomali

    To address growing scalability issues, organizations will need to embrace a distributed computing approach to security. In addition, Threat Intelligence Platforms will need to create organizational relevance for threat intelligence data.

  • Next Generation Cybersecurity: The Age of Artificial Intelligence

    Sponsored by: MASERGY

    Traditional cybersecurity strategies are failing and need advanced intelligence and analytics to sort through an enormous amount of data that organizations possess. This webinar will show how artificial intelligence can augment existing security solutions with patented network behavioral analysis to fill the gaps in current effort.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.